THE EVOLUTION OF AUTOMATED RANSOMWARE THREAT

Cyber criminals match security professionals step for step in order to break through their established defenses which get stronger and stringent over time. As a natural consequence to this cat-and-mouse...

XKEYSCORE DATA COLLECTION AND SORTING MECHANISMS

The XKeyscore system depends on an immense data mining and storage program for its success. In this context, it is desirable to have an efficient system that can process,...

XKEYSCORE FOR HACKING AND COUNTER-INTELLIGENCE

INTRODUCTION NSA’s prized data sniffing and storing database plays a pivotal role in how the US government and its allies hack computer networks globally. As per...

XKEYSCORE – AN INDEPTH ANALYSIS PART – II

XKEYSCORE OPERATIONS – LIFTING THE HOOD The XKeyscore’s reach across the global web traffic is so intense and well entrenched that there is a fair chance...

XKEYSCORE – AN INDEPTH ANALYSIS PART – I

INTRODUCTION AND SCOPE The XKeyscore has taken mass surveillance to newer levels of sophistication. In NSA’s words, it is the agency’s ‘widest reaching’ spying system. Experts have...

VULNERABLITIES OF THE XKEYSOCRE SYSTEM

The XKeyscore is a highly sophisticated and efficient data collection and storage surveillance program. It is, therefore, natural to assume that the architecture of such a critical system that is...

ENCRYPTED MALWARE SPREAD

Web traffic has witnessed an exponential rise in encryption owing to privacy and data confidentiality concerns. This includes both legitimate and malicious traffic, the latter finding encryption as an effective...

COUNTERING THE VPNFilter THREAT

The VPNFilter targets IoT devices that include a large number of users who aren’t tech savvy to defend against such lethal threats by following even the minimum guidelines for countering...

DEFENDING SYSTEMS AGAINST ILLEGAL CRYPTO-MINING

Crypto-mining has witnessed an exponential rise owing to handsome financial benefits it promises, even though stiff competition threatens to keep small-time miners out and forces sophisticated ones...

XKEYSCORE – A PROGRAMMING/SOFTWARE PERSPECTIVE

XKeyscore, NSA’s prime tool that perhaps spearheaded the largest mass surveillance program in human history is surprisingly built around simple software. On the...
- Advertisement -

Latest article

Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts

If you have an account with Microsoft Outlook email service, there is a possibility that your account information has been compromised by...

Binance Hacked — Hackers Stole Over $40 Million Worth Of Bitcoin

Binance, one of the largest cryptocurrency exchanges in the world, confirmed today that the company lost nearly $41 million in Bitcoin in...

Exclusive: German Police Raid OmniRAT Developer and Seize Digital Assets

The German police yesterday raided the house of the developer of OmniRAT and seized his laptop, computer and mobile phones probably as...